Skip to content

Commit

Permalink
Merge branch 'main' into kubectl-request-timeout
Browse files Browse the repository at this point in the history
  • Loading branch information
james03160927 authored Jan 6, 2025
2 parents 125eb01 + f23a5f8 commit d0f3e89
Show file tree
Hide file tree
Showing 3 changed files with 60 additions and 60 deletions.
60 changes: 27 additions & 33 deletions modules/aws/s3.go
Original file line number Diff line number Diff line change
Expand Up @@ -420,6 +420,33 @@ func GetS3BucketPolicyE(t testing.TestingT, awsRegion string, bucket string) (st
return aws.ToString(res.Policy), nil
}

func GetS3BucketOwnershipControls(t testing.TestingT, awsRegion, bucket string) []string {
rules, err := GetS3BucketOwnershipControlsE(t, awsRegion, bucket)
require.NoError(t, err)

return rules
}

func GetS3BucketOwnershipControlsE(t testing.TestingT, awsRegion, bucket string) ([]string, error) {
s3Client, err := NewS3ClientE(t, awsRegion)
if err != nil {
return nil, err
}

out, err := s3Client.GetBucketOwnershipControls(context.Background(), &s3.GetBucketOwnershipControlsInput{
Bucket: &bucket,
})
if err != nil {
return nil, err
}

rules := make([]string, 0, len(out.OwnershipControls.Rules))
for _, rule := range out.OwnershipControls.Rules {
rules = append(rules, string(rule.ObjectOwnership))
}
return rules, nil
}

// AssertS3BucketExists checks if the given S3 bucket exists in the given region and fail the test if it does not.
func AssertS3BucketExists(t testing.TestingT, region string, name string) {
err := AssertS3BucketExistsE(t, region, name)
Expand Down Expand Up @@ -478,39 +505,6 @@ func AssertS3BucketPolicyExistsE(t testing.TestingT, region string, bucketName s
return nil
}

// AssertS3BucketServerSideEncryption checks if the given S3 bucket has a server side encryption configured using the given algorithm and fail the test if it does not
func AssertS3BucketServerSideEncryption(t testing.TestingT, region string, bucketName string, algorithm types.ServerSideEncryption) {
err := AssertS3BucketServerSideEncryptionE(t, region, bucketName, algorithm)
require.NoError(t, err)
}

// AssertS3BucketServerSideEncryptionE checks if the given S3 bucket has a server side encryption configured using the given algorithm and returns an error if it does not
func AssertS3BucketServerSideEncryptionE(t testing.TestingT, region string, bucketName string, algorithm types.ServerSideEncryption) (err error) {
s3Client, err := NewS3ClientE(t, region)
if err != nil {
return err
}
input := &s3.GetBucketEncryptionInput{
Bucket: aws.String(bucketName),
}
c, err := s3Client.GetBucketEncryption(context.Background(), input)
if err != nil {
return err
}

err = fmt.Errorf("SSE is not enabled for bucket %s in region %s", bucketName, region)
for _, rule := range c.ServerSideEncryptionConfiguration.Rules {
if rule.ApplyServerSideEncryptionByDefault == nil {
continue
}
if rule.ApplyServerSideEncryptionByDefault.SSEAlgorithm == algorithm {
return nil
}
}
return

}

// NewS3Client creates an S3 client.
func NewS3Client(t testing.TestingT, region string) *s3.Client {
client, err := NewS3ClientE(t, region)
Expand Down
58 changes: 32 additions & 26 deletions modules/aws/s3_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -268,41 +268,47 @@ func testEmptyBucket(t *testing.T, s3Client *s3.Client, region string, s3BucketN
require.Equal(t, 0, len((*bucketObjects).Contents))
}

func TestAssertS3BucketServerSideEncryptionE(t *testing.T) {
func TestGetS3BucketOwnershipControls(t *testing.T) {
t.Parallel()

region := GetRandomStableRegion(t, nil, nil)
s3client := NewS3Client(t, region)

id := random.UniqueId()
logger.Default.Logf(t, "Random values selected. Region = %s, Id = %s\n", region, id)

table := []types.ServerSideEncryption{
types.ServerSideEncryptionAes256,
types.ServerSideEncryptionAwsKms,
}
for i, tt := range table {
t.Run(fmt.Sprintf("%s", tt), func(t *testing.T) {
s3BucketName := fmt.Sprintf("gruntwork-terratest-sse-%d-%s", i, strings.ToLower(id))
CreateS3Bucket(t, region, s3BucketName)
t.Cleanup(func() { DeleteS3Bucket(t, region, s3BucketName) })
s3BucketName := "gruntwork-terratest-" + strings.ToLower(id)
CreateS3Bucket(t, region, s3BucketName)
t.Cleanup(func() {
DeleteS3Bucket(t, region, s3BucketName)
})

input := &s3.PutBucketEncryptionInput{
Bucket: aws.String(s3BucketName),
ServerSideEncryptionConfiguration: &types.ServerSideEncryptionConfiguration{
Rules: []types.ServerSideEncryptionRule{
{
ApplyServerSideEncryptionByDefault: &types.ServerSideEncryptionByDefault{
SSEAlgorithm: tt,
},
},
t.Run("Exist", func(t *testing.T) {
s3Client, err := NewS3ClientE(t, region)
require.NoError(t, err)
_, err = s3Client.PutBucketOwnershipControls(context.Background(), &s3.PutBucketOwnershipControlsInput{
Bucket: &s3BucketName,
OwnershipControls: &types.OwnershipControls{
Rules: []types.OwnershipControlsRule{
{
ObjectOwnership: types.ObjectOwnershipBucketOwnerEnforced,
},
},
}
_, err := s3client.PutBucketEncryption(context.Background(), input)
},
})
require.NoError(t, err)
t.Cleanup(func() {
_, err := s3Client.DeleteBucketOwnershipControls(context.Background(), &s3.DeleteBucketOwnershipControlsInput{
Bucket: &s3BucketName,
})
require.NoError(t, err)

AssertS3BucketServerSideEncryption(t, region, s3BucketName, tt)
})
}

controls := GetS3BucketOwnershipControls(t, region, s3BucketName)
assert.Equal(t, 1, len(controls))
assert.Equal(t, string(types.ObjectOwnershipBucketOwnerEnforced), controls[0])
})

t.Run("NotExist", func(t *testing.T) {
_, err := GetS3BucketOwnershipControlsE(t, region, s3BucketName)
assert.Error(t, err)
})
}
2 changes: 1 addition & 1 deletion modules/terraform/cmd.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,7 @@ func RunTerraformCommandAndGetStdoutE(t testing.TestingT, additionalOptions *Opt
cmd := generateCommand(options, args...)
description := fmt.Sprintf("%s %v", options.TerraformBinary, args)
return retry.DoWithRetryableErrorsE(t, description, options.RetryableTerraformErrors, options.MaxRetries, options.TimeBetweenRetries, func() (string, error) {
s, err := shell.RunCommandAndGetOutputE(t, cmd)
s, err := shell.RunCommandAndGetStdOutE(t, cmd)
if err != nil {
return s, err
}
Expand Down

0 comments on commit d0f3e89

Please sign in to comment.